Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-25675 : What You Need to Know

Learn about CVE-2023-25675 impacting TensorFlow versions prior to 2.12.0 and 2.11.1, causing a high availability risk with a CVSS base score of 7.5. Update to secure your system.

This CVE was assigned on February 9, 2023, and published on March 24, 2023, by GitHub_M. It is related to TensorFlow experiencing a Segfault in Bincount when using XLA.

Understanding CVE-2023-25675

This vulnerability impacts TensorFlow versions prior to 2.12.0 and 2.11.1 when interacting with XLA, resulting in a segfault in

tf.raw_ops.Bincount
under specific conditions regarding the
weights
parameter.

What is CVE-2023-25675?

CVE-2023-25675 highlights an issue in TensorFlow, an open-source machine learning platform, where the segfault occurs when providing the

weights
parameter in
tf.raw_ops.Bincount
that does not match the shape of the
arr
parameter or is not a length-0 tensor. The vulnerability has been addressed in TensorFlow versions 2.12.0 and 2.11.1.

The Impact of CVE-2023-25675

This vulnerability poses a high risk with a CVSS base score of 7.5, indicating a significant impact on availability. However, it does not affect confidentiality or integrity and does not require any specific user privileges for exploitation.

Technical Details of CVE-2023-25675

The following details provide insights into the vulnerability's description, affected systems, and the exploitation mechanism:

Vulnerability Description

The vulnerability arises in TensorFlow when using XLA, specifically in the

tf.raw_ops.Bincount
function, leading to a segfault when certain conditions related to the
weights
parameter are met.

Affected Systems and Versions

The affected systems are those running TensorFlow versions prior to 2.12.0 and 2.11.1 with XLA enabled. The specific issue occurs when incompatible

weights
parameters are provided to the
tf.raw_ops.Bincount
function.

Exploitation Mechanism

Exploiting this vulnerability involves triggering the segfault in

tf.raw_ops.Bincount
by supplying a
weights
parameter that does not align with the expected shape requirements, causing the application to crash.

Mitigation and Prevention

Taking immediate steps and implementing long-term security practices are crucial in mitigating the risks associated with CVE-2023-25675. Additionally, applying patches and updates provided by TensorFlow is essential to prevent any exploitation of this vulnerability.

Immediate Steps to Take

Users are strongly recommended to update their TensorFlow installations to versions 2.12.0 or 2.11.1 to mitigate the vulnerability and prevent potential segfaults in

tf.raw_ops.Bincount
.

Long-Term Security Practices

Maintaining up-to-date software, implementing secure coding practices, and conducting regular security audits can help enhance the overall security posture and prevent similar vulnerabilities in the future.

Patching and Updates

Users should regularly check for security advisories and updates from TensorFlow to stay informed about patches addressing CVE-2023-25675 and other potential vulnerabilities, ensuring their systems are adequately protected.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now